Analysis
-
max time kernel
119s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
27-08-2023 22:37
Static task
static1
Behavioral task
behavioral1
Sample
aspose.msi
Resource
win7-20230712-en
General
-
Target
aspose.msi
-
Size
5.8MB
-
MD5
c3798ee9903ba07a6608ad0778d422d3
-
SHA1
b12ee580df86de2cabf8a921bc9652ad1e874f20
-
SHA256
5096934b3f97efee0dfc0f5d2b10ee1c78be523238a6f2685b58d36b8ff80cdd
-
SHA512
5c0afd03d9de60d1643f8db33609b478e95f0e3a7bdeffca2ad858175716ec7565fdcf90b125235a5c894049fd992485ffcf1b425db96719c6b9ad825359fb60
-
SSDEEP
98304:T+XA2HC4mqHqaPkxQ0FLXKhs7oS+YIAknI6cI1UEqBr95:FGHqaPUQ0xa17xAkafEqd
Malware Config
Signatures
-
Babadeda Crypter 1 IoCs
resource yara_rule behavioral1/files/0x0006000000016621-114.dat family_babadeda -
Blocklisted process makes network request 2 IoCs
flow pid Process 3 2780 msiexec.exe 4 2700 msiexec.exe -
Executes dropped EXE 1 IoCs
pid Process 1632 ScrollNavigator.exe -
Loads dropped DLL 8 IoCs
pid Process 2680 MsiExec.exe 2680 MsiExec.exe 2680 MsiExec.exe 2680 MsiExec.exe 1632 ScrollNavigator.exe 1632 ScrollNavigator.exe 1632 ScrollNavigator.exe 1632 ScrollNavigator.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\S: msiexec.exe -
Drops file in Windows directory 10 IoCs
description ioc Process File opened for modification C:\Windows\Installer\f76787a.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI79C6.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI7CD4.tmp msiexec.exe File created C:\Windows\Installer\f76787d.ipi msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File created C:\Windows\Installer\f76787a.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI7C08.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI7CF4.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI8493.tmp msiexec.exe File opened for modification C:\Windows\Installer\f76787d.ipi msiexec.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2700 msiexec.exe 2700 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 52 IoCs
description pid Process Token: SeShutdownPrivilege 2780 msiexec.exe Token: SeIncreaseQuotaPrivilege 2780 msiexec.exe Token: SeRestorePrivilege 2700 msiexec.exe Token: SeTakeOwnershipPrivilege 2700 msiexec.exe Token: SeSecurityPrivilege 2700 msiexec.exe Token: SeCreateTokenPrivilege 2780 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 2780 msiexec.exe Token: SeLockMemoryPrivilege 2780 msiexec.exe Token: SeIncreaseQuotaPrivilege 2780 msiexec.exe Token: SeMachineAccountPrivilege 2780 msiexec.exe Token: SeTcbPrivilege 2780 msiexec.exe Token: SeSecurityPrivilege 2780 msiexec.exe Token: SeTakeOwnershipPrivilege 2780 msiexec.exe Token: SeLoadDriverPrivilege 2780 msiexec.exe Token: SeSystemProfilePrivilege 2780 msiexec.exe Token: SeSystemtimePrivilege 2780 msiexec.exe Token: SeProfSingleProcessPrivilege 2780 msiexec.exe Token: SeIncBasePriorityPrivilege 2780 msiexec.exe Token: SeCreatePagefilePrivilege 2780 msiexec.exe Token: SeCreatePermanentPrivilege 2780 msiexec.exe Token: SeBackupPrivilege 2780 msiexec.exe Token: SeRestorePrivilege 2780 msiexec.exe Token: SeShutdownPrivilege 2780 msiexec.exe Token: SeDebugPrivilege 2780 msiexec.exe Token: SeAuditPrivilege 2780 msiexec.exe Token: SeSystemEnvironmentPrivilege 2780 msiexec.exe Token: SeChangeNotifyPrivilege 2780 msiexec.exe Token: SeRemoteShutdownPrivilege 2780 msiexec.exe Token: SeUndockPrivilege 2780 msiexec.exe Token: SeSyncAgentPrivilege 2780 msiexec.exe Token: SeEnableDelegationPrivilege 2780 msiexec.exe Token: SeManageVolumePrivilege 2780 msiexec.exe Token: SeImpersonatePrivilege 2780 msiexec.exe Token: SeCreateGlobalPrivilege 2780 msiexec.exe Token: SeRestorePrivilege 2700 msiexec.exe Token: SeTakeOwnershipPrivilege 2700 msiexec.exe Token: SeRestorePrivilege 2700 msiexec.exe Token: SeTakeOwnershipPrivilege 2700 msiexec.exe Token: SeRestorePrivilege 2700 msiexec.exe Token: SeTakeOwnershipPrivilege 2700 msiexec.exe Token: SeRestorePrivilege 2700 msiexec.exe Token: SeTakeOwnershipPrivilege 2700 msiexec.exe Token: SeRestorePrivilege 2700 msiexec.exe Token: SeTakeOwnershipPrivilege 2700 msiexec.exe Token: SeRestorePrivilege 2700 msiexec.exe Token: SeTakeOwnershipPrivilege 2700 msiexec.exe Token: SeRestorePrivilege 2700 msiexec.exe Token: SeTakeOwnershipPrivilege 2700 msiexec.exe Token: SeRestorePrivilege 2700 msiexec.exe Token: SeTakeOwnershipPrivilege 2700 msiexec.exe Token: SeRestorePrivilege 2700 msiexec.exe Token: SeTakeOwnershipPrivilege 2700 msiexec.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2780 msiexec.exe 2780 msiexec.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 1632 ScrollNavigator.exe 1632 ScrollNavigator.exe 1632 ScrollNavigator.exe 1632 ScrollNavigator.exe 1632 ScrollNavigator.exe 1632 ScrollNavigator.exe 1632 ScrollNavigator.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2700 wrote to memory of 2680 2700 msiexec.exe 29 PID 2700 wrote to memory of 2680 2700 msiexec.exe 29 PID 2700 wrote to memory of 2680 2700 msiexec.exe 29 PID 2700 wrote to memory of 2680 2700 msiexec.exe 29 PID 2700 wrote to memory of 2680 2700 msiexec.exe 29 PID 2700 wrote to memory of 2680 2700 msiexec.exe 29 PID 2700 wrote to memory of 2680 2700 msiexec.exe 29 PID 2700 wrote to memory of 1632 2700 msiexec.exe 30 PID 2700 wrote to memory of 1632 2700 msiexec.exe 30 PID 2700 wrote to memory of 1632 2700 msiexec.exe 30 PID 2700 wrote to memory of 1632 2700 msiexec.exe 30
Processes
-
C:\Windows\system32\msiexec.exemsiexec.exe /I C:\Users\Admin\AppData\Local\Temp\aspose.msi1⤵
- Blocklisted process makes network request
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2780
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Blocklisted process makes network request
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding C78E12C089CF745CC1B2A463A85F03382⤵
- Loads dropped DLL
PID:2680
-
-
C:\Users\Admin\AppData\Local\Aspose.Words for .NET\ScrollNavigator.exe"C:\Users\Admin\AppData\Local\Aspose.Words for .NET\ScrollNavigator.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1632
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD54ebec19839640d6b67047a00afdb7291
SHA19cd8081c8cd212220770a86f00f6f85210b7d82e
SHA256a58edb7aff177e24949e3fa79b233c14bacb87cb7e8b490503ee19572a6271f2
SHA512ece843ece697ad1aa9b47b7e664b9b0adc194c2b63961b682152b2d32dfa74d1fb22b24f91a218c2c26edbc90aad9d0510eaa60ed280fa7acd113674a31c930f
-
Filesize
61KB
MD5f3441b8572aae8801c04f3060b550443
SHA14ef0a35436125d6821831ef36c28ffaf196cda15
SHA2566720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA5125ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9
-
Filesize
61KB
MD5f3441b8572aae8801c04f3060b550443
SHA14ef0a35436125d6821831ef36c28ffaf196cda15
SHA2566720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA5125ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5500418963b8adcec3cdbfea6761a8e92
SHA112d3a9def1d0e92066d5884daca3a6ae0cb58ff8
SHA256e4f355d47d29b9ab78004bcafb5b61533e272710cc49d318982360a1471436b7
SHA5121baf14f4794163cdde5658e59a8a35214a1eabbe38ad5bff680e2ce1a2cdc18fafbb5e2fb366a5087e90ded201ba828a0e891ee5fb7da4eec9361a7b130ee0c8
-
Filesize
80KB
MD5868a85db64eb92a821e6928a9e161270
SHA1b853cff977b4e5c80463e7c94287332b28e47537
SHA25667be9154c7c4f83d1009b434a8dadb7b64083db602e0dd4fb6f4c0b64eabcd64
SHA5129013976f07ca492fabb69ae276d80d07198f52eccc34a1f7f50e3c6167721f95b2730bdd151133bc626ff1b3de5391a9c9994163153edc8af247b041d77cb95c
-
Filesize
1.5MB
MD5700f45b97576c03feb6e7f82f34f92a5
SHA1c6d4639261874019aab3d1edecebf827652b4dd4
SHA2568d8ed55802b825f7ec8b19008f00fa2514ede5010350975295cbdc4700ffaace
SHA512c54d342d968b9c28748b6226fbf35f4a417baa57568a11ce37dfc5996f6f18492b9ce9c558e24b82a4d17257fd6fae7d00b2d270703cbb9961ffe10ae27cfe8f
-
Filesize
1.5MB
MD5700f45b97576c03feb6e7f82f34f92a5
SHA1c6d4639261874019aab3d1edecebf827652b4dd4
SHA2568d8ed55802b825f7ec8b19008f00fa2514ede5010350975295cbdc4700ffaace
SHA512c54d342d968b9c28748b6226fbf35f4a417baa57568a11ce37dfc5996f6f18492b9ce9c558e24b82a4d17257fd6fae7d00b2d270703cbb9961ffe10ae27cfe8f
-
Filesize
365KB
MD58acc93a5e7f034341465e19ca8153ec9
SHA1f4192443c09167756dfe7c887626feeac1407265
SHA2564df7928a91a8fbfd2068f858347eccbf2423d2c61be8ef61e3ae4c3034fb7bb7
SHA512e6229abe8c360a58ad5342b1eeb815d57c7645525233bd6a79384dda254e7d3849dd6a345acbdd759bccfbffa41a3de31fafdb682b989e90ad1003035f2f3637
-
Filesize
1.2MB
MD50f849bc43ffe1bb5f29aac19f11f6740
SHA12bb74d7772c4b7cae2571e5751914e267b482002
SHA25665eb8d11d173cc5c330a2a87f602e2140c1a73b7cda6eb8c46b88ed2ff093860
SHA51208f168fd42ec9bd83cb6a1f8b580ef50a8aa97db5abd70c1323c090931e29963b1eca350ca9fdebdc5d56b824bc8c11f9b2a1a44f466ea44f5bdb05bf8526675
-
Filesize
1.1MB
MD588d23c6d9df3fd0481f0fc5f6f371ad1
SHA14fb6f9aca5c18687d95202d17ece1fbec90f4bad
SHA25616da76874a974a58ccd9f8473cce66155237c032567d829d79bb08246b9a71a1
SHA5129eb29d5d64b82be54228149f652fbe4696bb619628f1188a2284c1a5fa3bde41e1b0405162675a275aab9c8d4d0d78c3784204cc11fca3049a3a416723a264b0
-
Filesize
132KB
MD5dd3d067c139254d741a8b4f3a8af216e
SHA1dddbb19996620ddfd9e9625f4c502356efed2c25
SHA256e19006a51b60dcc3e212948ff5531bb7a4c69f832f256de13b84aa646baf8c57
SHA51204ef2d19a5c5c49817ee9214d7eeae513795a440209923009caa6283cc467762837fc2da5ac20c517a7326fde2fffca444b011e5bee089ecf6bb1177b705734c
-
Filesize
62KB
MD53ac860860707baaf32469fa7cc7c0192
SHA1c33c2acdaba0e6fa41fd2f00f186804722477639
SHA256d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904
SHA512d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c
-
Filesize
164KB
MD54ff65ad929cd9a367680e0e5b1c08166
SHA1c0af0d4396bd1f15c45f39d3b849ba444233b3a2
SHA256c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6
SHA512f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27
-
Filesize
163KB
MD59441737383d21192400eca82fda910ec
SHA1725e0d606a4fc9ba44aa8ffde65bed15e65367e4
SHA256bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5
SHA5127608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf
-
Filesize
588KB
MD5a9941233b9415b479d3b4f3732161eab
SHA1cb2d99af52b3b1c712943b13e45d85c80c732e57
SHA256ce34cc14e8d26119e1bf28a3a8368da6e10d13851004e2675976c5ad58b122e2
SHA512cfd6c425587e5e7c57b6f4655e2a48c871313e2bacf63cc0955ccae1a384610644f26aa76bee0a2a327cd77c2ae7def8ea9cb0c7c7c87fab1c8196bac82037f7
-
Filesize
588KB
MD5a9941233b9415b479d3b4f3732161eab
SHA1cb2d99af52b3b1c712943b13e45d85c80c732e57
SHA256ce34cc14e8d26119e1bf28a3a8368da6e10d13851004e2675976c5ad58b122e2
SHA512cfd6c425587e5e7c57b6f4655e2a48c871313e2bacf63cc0955ccae1a384610644f26aa76bee0a2a327cd77c2ae7def8ea9cb0c7c7c87fab1c8196bac82037f7
-
Filesize
588KB
MD5a9941233b9415b479d3b4f3732161eab
SHA1cb2d99af52b3b1c712943b13e45d85c80c732e57
SHA256ce34cc14e8d26119e1bf28a3a8368da6e10d13851004e2675976c5ad58b122e2
SHA512cfd6c425587e5e7c57b6f4655e2a48c871313e2bacf63cc0955ccae1a384610644f26aa76bee0a2a327cd77c2ae7def8ea9cb0c7c7c87fab1c8196bac82037f7
-
Filesize
588KB
MD5a9941233b9415b479d3b4f3732161eab
SHA1cb2d99af52b3b1c712943b13e45d85c80c732e57
SHA256ce34cc14e8d26119e1bf28a3a8368da6e10d13851004e2675976c5ad58b122e2
SHA512cfd6c425587e5e7c57b6f4655e2a48c871313e2bacf63cc0955ccae1a384610644f26aa76bee0a2a327cd77c2ae7def8ea9cb0c7c7c87fab1c8196bac82037f7
-
Filesize
588KB
MD5a9941233b9415b479d3b4f3732161eab
SHA1cb2d99af52b3b1c712943b13e45d85c80c732e57
SHA256ce34cc14e8d26119e1bf28a3a8368da6e10d13851004e2675976c5ad58b122e2
SHA512cfd6c425587e5e7c57b6f4655e2a48c871313e2bacf63cc0955ccae1a384610644f26aa76bee0a2a327cd77c2ae7def8ea9cb0c7c7c87fab1c8196bac82037f7
-
Filesize
80KB
MD5868a85db64eb92a821e6928a9e161270
SHA1b853cff977b4e5c80463e7c94287332b28e47537
SHA25667be9154c7c4f83d1009b434a8dadb7b64083db602e0dd4fb6f4c0b64eabcd64
SHA5129013976f07ca492fabb69ae276d80d07198f52eccc34a1f7f50e3c6167721f95b2730bdd151133bc626ff1b3de5391a9c9994163153edc8af247b041d77cb95c
-
Filesize
365KB
MD58acc93a5e7f034341465e19ca8153ec9
SHA1f4192443c09167756dfe7c887626feeac1407265
SHA2564df7928a91a8fbfd2068f858347eccbf2423d2c61be8ef61e3ae4c3034fb7bb7
SHA512e6229abe8c360a58ad5342b1eeb815d57c7645525233bd6a79384dda254e7d3849dd6a345acbdd759bccfbffa41a3de31fafdb682b989e90ad1003035f2f3637
-
Filesize
1.2MB
MD50f849bc43ffe1bb5f29aac19f11f6740
SHA12bb74d7772c4b7cae2571e5751914e267b482002
SHA25665eb8d11d173cc5c330a2a87f602e2140c1a73b7cda6eb8c46b88ed2ff093860
SHA51208f168fd42ec9bd83cb6a1f8b580ef50a8aa97db5abd70c1323c090931e29963b1eca350ca9fdebdc5d56b824bc8c11f9b2a1a44f466ea44f5bdb05bf8526675
-
Filesize
132KB
MD5dd3d067c139254d741a8b4f3a8af216e
SHA1dddbb19996620ddfd9e9625f4c502356efed2c25
SHA256e19006a51b60dcc3e212948ff5531bb7a4c69f832f256de13b84aa646baf8c57
SHA51204ef2d19a5c5c49817ee9214d7eeae513795a440209923009caa6283cc467762837fc2da5ac20c517a7326fde2fffca444b011e5bee089ecf6bb1177b705734c
-
Filesize
588KB
MD5a9941233b9415b479d3b4f3732161eab
SHA1cb2d99af52b3b1c712943b13e45d85c80c732e57
SHA256ce34cc14e8d26119e1bf28a3a8368da6e10d13851004e2675976c5ad58b122e2
SHA512cfd6c425587e5e7c57b6f4655e2a48c871313e2bacf63cc0955ccae1a384610644f26aa76bee0a2a327cd77c2ae7def8ea9cb0c7c7c87fab1c8196bac82037f7
-
Filesize
588KB
MD5a9941233b9415b479d3b4f3732161eab
SHA1cb2d99af52b3b1c712943b13e45d85c80c732e57
SHA256ce34cc14e8d26119e1bf28a3a8368da6e10d13851004e2675976c5ad58b122e2
SHA512cfd6c425587e5e7c57b6f4655e2a48c871313e2bacf63cc0955ccae1a384610644f26aa76bee0a2a327cd77c2ae7def8ea9cb0c7c7c87fab1c8196bac82037f7
-
Filesize
588KB
MD5a9941233b9415b479d3b4f3732161eab
SHA1cb2d99af52b3b1c712943b13e45d85c80c732e57
SHA256ce34cc14e8d26119e1bf28a3a8368da6e10d13851004e2675976c5ad58b122e2
SHA512cfd6c425587e5e7c57b6f4655e2a48c871313e2bacf63cc0955ccae1a384610644f26aa76bee0a2a327cd77c2ae7def8ea9cb0c7c7c87fab1c8196bac82037f7
-
Filesize
588KB
MD5a9941233b9415b479d3b4f3732161eab
SHA1cb2d99af52b3b1c712943b13e45d85c80c732e57
SHA256ce34cc14e8d26119e1bf28a3a8368da6e10d13851004e2675976c5ad58b122e2
SHA512cfd6c425587e5e7c57b6f4655e2a48c871313e2bacf63cc0955ccae1a384610644f26aa76bee0a2a327cd77c2ae7def8ea9cb0c7c7c87fab1c8196bac82037f7